{"response":{"docs":[{"system_create_dtsi":"2020-08-14T17:09:14Z","system_modified_dtsi":"2020-08-14T17:09:18Z","has_model_ssim":["Article"],"id":"kd17cv25d","accessControl_ssim":["5cdb16bc-9adb-4c6a-8e25-e69fc0946209"],"depositor_ssim":["turnergw@mail.uc.edu"],"depositor_tesim":["turnergw@mail.uc.edu"],"title_tesim":["How the UK Can Lead in 5G and 6G Security and Standards"],"date_uploaded_dtsi":"2020-08-14T17:09:14Z","date_modified_dtsi":"2020-08-14T17:09:14Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/18ch-1a56"],"geo_subject_tesim":["US","West","World","UK","Europe","Five Eyes","United Kingdom","United States","China"],"journal_title_tesim":["RUSI Newsbrief"],"time_period_tesim":["21st Century","2020"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Educational Studies"],"creator_tesim":["Huang, Russell","Turner, Grant"],"publisher_tesim":["Royal United Services Institute"],"subject_tesim":["international organizations","sanctions","GCHQ","emerging technologies","trade","foreign policy","Government Communications Headquarters","network security","United KIngdom","domestic policy","international cooperation","6g","Cyber Security","5g","HCSEC","cybersecurity","Huawei Cyber Security Evaluation Centre","security studies","China","telecommunications","defense","strategy","national cyber security centre","international relations","Huawei","UK","ncsc","Five Eyes"],"language_tesim":["English"],"description_tesim":["The UK has created one of the best tools for mitigating Huawei’s risks. Whether or not the UK Huawei ban stands, its Huawei Cyber Security Evaluation Centre should receive increased funding and support to protect and enhance its interests at home and abroad."],"license_tesim":["http://creativecommons.org/licenses/by-nc-sa/4.0/"],"date_created_tesim":["2020-08-14"],"related_url_tesim":["https://rusi.org/publication/rusi-newsbrief/how-uk-can-lead-5g-and-6g-security-and-standards"],"source_tesim":["RUSI Newsbrief"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"HOW THE UK CAN LEAD IN 5G AND 6G SECURITY AND STANDARDS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["turnergw@mail.uc.edu"],"nesting_collection__pathnames_ssim":["kd17cv25d"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697093993405349888,"timestamp":"2021-04-15T08:22:34.038Z","score":0.00049999997},{"system_create_dtsi":"2020-07-08T16:12:53Z","system_modified_dtsi":"2020-07-08T16:13:08Z","has_model_ssim":["Document"],"id":"9306t085s","accessControl_ssim":["68adf3c3-a5b0-45b2-80b1-a806e019fffe"],"hasRelatedMediaFragment_ssim":["3484zj368"],"hasRelatedImage_ssim":["3484zj368"],"depositor_ssim":["turnergw@mail.uc.edu"],"depositor_tesim":["turnergw@mail.uc.edu"],"title_tesim":["WORKING DRAFT - 5G and International Security: How the UK can Lead the Way"],"date_uploaded_dtsi":"2020-07-08T16:12:52Z","date_modified_dtsi":"2020-07-08T16:12:52Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/mm4a-v130"],"geo_subject_tesim":["Britain","United Kingdom","United States","Canada","Norway","Australia","PRC","Asia","Europe","New Zealand","Japan","World","Finland","UK","China"],"genre_tesim":["Manuscript"],"time_period_tesim":["21st Century"],"note_tesim":["This draft is in progress, though mostly complete. We are uploading this draft now both as a time stamp and so we can reference it in shorter articles summarizing our work."],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Educational Studies"],"creator_tesim":["Huang, Russell","Turner, Grant"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Defense","Internet of Things","6G","Sharp Power","Complex Systems","Economics","5G","Law","International Relations","Computer Science","Action Research","Competition","Hard Power","Intelligence Studies","Cyber Security","5 Eyes","Technology","Huawei","Diplomacy","Five Eyes","Soft Power","Security Studies","Political Science","International Affairs","Supply Chain Risk Management","Globalization"],"language_tesim":["English"],"description_tesim":["The current debates revolving around 5G, Huawei, and how they are resolved, are highly visible indicators of the technology based shifts in the global order which are setting the tone for the 21st century. Currently, it seems that many in the US and the PRC are using Cold War and Thucydides Trap paradigms, with a zero-sum mentality. At least in the case of 5G technology, the UK seems to have taken a more nuanced approach. \r\n\r\nThis article comes as the UK prepares its new National Cyber Security Strategy, reviewing the 5G and cyber security debates surrounding Huawei in a highly interdisciplinary manner, and directing readers to a rich variety of resources. In addition to its analysis of issues and solutions often absent from the discourse, this article’s feature contribution is the argument that the UK can be more than an example of a middle way. Specifically, if the UK scales up and internationalizes its Huawei Cyber Security Evaluation Center, perhaps by creating an International Cyber Security Evaluation Center, it can lead its allies and the world in 5G, 6G, cybersecurity, and international relations, filling a vital leadership vacuum.\r\n"],"license_tesim":["http://creativecommons.org/licenses/by-sa/4.0/"],"date_created_tesim":["June 30, 2020"],"thumbnail_path_ss":"/downloads/3484zj368?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["3484zj368"],"member_of_collections_ssim":["International Relations - China"],"member_of_collection_ids_ssim":["vx021g49h"],"file_set_ids_ssim":["3484zj368"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"WORKING DRAFT 5G AND INTERNATIONAL SECURITY HOW THE UK CAN LEAD THE WAY","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["turnergw@mail.uc.edu"],"nesting_collection__ancestors_ssim":["vx021g49h"],"nesting_collection__parent_ids_ssim":["vx021g49h"],"nesting_collection__pathnames_ssim":["vx021g49h/9306t085s"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697121837722370048,"timestamp":"2021-04-15T15:45:08.448Z","score":0.00049999997},{"system_create_dtsi":"2019-03-01T05:47:51Z","system_modified_dtsi":"2019-06-06T15:12:41Z","has_model_ssim":["Document"],"id":"n009w3506","accessControl_ssim":["b3829d82-8265-4b4b-9984-6c5497850169"],"hasRelatedMediaFragment_ssim":["dv13zv41w"],"hasRelatedImage_ssim":["dv13zv41w"],"depositor_ssim":["angelwr@mail.uc.edu"],"depositor_tesim":["angelwr@mail.uc.edu"],"title_tesim":["Dark Knowledge: A Study on Public Perceptions of the Dark Web"],"date_uploaded_dtsi":"2019-03-01T05:47:51Z","date_modified_dtsi":"2019-03-01T05:47:51Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C27M5N"],"alternate_title_tesim":["Dark Knowledge: Public Perceptions of the Dark Web"],"genre_tesim":["Document"],"time_period_tesim":["21st Century"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Angel, William"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology","Black Market","Cyber Security","Dark Web"],"language_tesim":["English"],"description_tesim":["In this paper, I study how general technology users perceive the dark web. In this study, \r\nI conducted research on what these users know about dark web technologies, activities, \r\ncontent, and how their perceptions changed after a first-hand experience on dark web \r\nmarketplaces and sites. I aimed to tackle myths and misconceptions that users had about the \r\ndark web and present new data in order to educate and bring awareness to the dark web to \r\nthose who may never have the opportunity or reason to come upon this information on their \r\nown. It is my hope that the findings of this paper and the experiences of the participants will \r\nfoster the spread of knowledge and awareness to both the threats and benefits that the dark \r\nweb contributes to society. "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-12-13"],"thumbnail_path_ss":"/downloads/dv13zv41w?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["dv13zv41w"],"file_set_ids_ssim":["dv13zv41w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DARK KNOWLEDGE A STUDY ON PUBLIC PERCEPTIONS OF THE DARK WEB","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["angelwr@mail.uc.edu"],"nesting_collection__pathnames_ssim":["n009w3506"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697114531394748416,"timestamp":"2021-04-15T13:49:00.591Z","score":0.00049999997},{"system_create_dtsi":"2018-10-10T01:04:25Z","system_modified_dtsi":"2019-06-06T15:04:11Z","has_model_ssim":["Article"],"id":"d217qq50s","accessControl_ssim":["99478a1c-f46e-43b5-958e-4b1d284d5bfe"],"hasRelatedMediaFragment_ssim":["w6634486f"],"hasRelatedImage_ssim":["w6634486f"],"depositor_ssim":["angelwr@mail.uc.edu"],"depositor_tesim":["angelwr@mail.uc.edu"],"title_tesim":["The Pulse of a Nation: A Study on the Cybersecurity Issues Plaguing the Healthcare Industry"],"date_uploaded_dtsi":"2018-10-10T01:04:25Z","date_modified_dtsi":"2018-10-10T01:11:06Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2VT4X"],"alternate_title_tesim":["The Pulse of a Nation: A Study on the Cybersecurity Issues Plaguing the Healthcare Industry"],"time_period_tesim":["21st Century"],"required_software_tesim":[""],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"note_tesim":[""],"creator_tesim":["Angel, William"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Dark Web","Black Market","Cyber Security","Healthcare","Information Technology"],"language_tesim":["English"],"description_tesim":["In this paper, I study how medical records are being used by cyber-criminal for financial gain and patient manipulation. I studied what kind of criminal organizations may be involved in these operations and confirmed incidents from the black market. I conducted a literature review which generated several sources from online databases. I determined five major criminal factions that are most likely to use compromised medical records, determined possible motivations and looked at several cases of medical records being sold on the black market. The healthcare industry’s digitization efforts have left it tremendously ill-equip to combat emerging threats. It is evident that the healthcare industry must take extreme measures in order to counteract the evolving threat landscape. It is my hope that the findings of paper will being to shed light on these issues and help healthcare professionals understand what kind of threats the industry is facing."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-23"],"thumbnail_path_ss":"/downloads/w6634486f?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["w6634486f"],"file_set_ids_ssim":["w6634486f"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PULSE OF A NATION A STUDY ON THE CYBERSECURITY ISSUES PLAGUING THE HEALTHCARE INDUSTRY","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["angelwr@mail.uc.edu"],"nesting_collection__pathnames_ssim":["d217qq50s"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697076415246106624,"timestamp":"2021-04-15T03:43:10.199Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":2,"label":"Article"},{"value":"Document","hits":2,"label":"Document"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Angel, William","hits":2,"label":"Angel, William"},{"value":"Huang, Russell","hits":2,"label":"Huang, Russell"},{"value":"Turner, Grant","hits":2,"label":"Turner, Grant"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Cyber Security","hits":4,"label":"Cyber Security"},{"value":"Black Market","hits":2,"label":"Black Market"},{"value":"Dark Web","hits":2,"label":"Dark Web"},{"value":"Five Eyes","hits":2,"label":"Five Eyes"},{"value":"Huawei","hits":2,"label":"Huawei"},{"value":"Information Technology","hits":2,"label":"Information Technology"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":4,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Educational Studies","hits":2,"label":"Educational Studies"},{"value":"School of Information Technology","hits":2,"label":"School of Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":4,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":3,"label":"University of Cincinnati"},{"value":"Royal United Services Institute","hits":1,"label":"Royal United Services Institute"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2018-04-23","hits":1,"label":"2018-04-23"},{"value":"2018-12-13","hits":1,"label":"2018-12-13"},{"value":"2020-08-14","hits":1,"label":"2020-08-14"},{"value":"June 30, 2020","hits":1,"label":"June 30, 2020"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"vx021g49h","hits":1,"label":"vx021g49h"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":4,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":4,"first_page?":true,"last_page?":true}}}